Vulnerability Alert

Cisco CSS Content Services Switch and ACE Application Control Engine HTTP SSL Header Spoofing Vulnerability

 
Threat Type:
IntelliShield ID:20807
Version:3
First Published:2010 July 02 14:15 GMT
Last Published:2010 October 05 19:10 GMT
Port: Not available
CVE:CVE-2010-1575
Urgency:Unlikely Use
Credibility:Confirmed
Severity:Mild Damage
CVSS Base:3.5 CVSS Calculator
CVSS Version 2.0
CVSS Temporal:3.2
 
Version Summary:

Cisco has provided additional information and safeguards for the Cisco CSS Content Services Switch and ACE Application Control Engine HTTP SSL header spoofing vulnerability.

 
 
Description

Cisco CSS Content Services Switch (CSS), SSL Services Module (SSLM), and ACE Application Control Engine (ACE) contain a vulnerability that could allow an authenticated, remote attacker to insert spoofed SSL headers into HTTP requests.

The vulnerability exists because the affected products weakly enforce authority in HTTP certificate headers when performing SSL session termination. An authenticated, remote attacker could exploit this vulnerability by inserting spoofed SSL certificate headers into requests that are passed to the affected products for SSL termination. If successful, an attacker might be able to perform man-in-the-middle attacks, gaining access to sensitive information.

Cisco has confirmed this vulnerability in software release notes and released updated software.

 
Warning Indicators

This vulnerability affects Cisco CSS devices, SSLM, and ACE modules.  SSL header insertion first appeared in version A2(3.0) for the ACE module; ACE appliances do not perform header insertion and are not affected.

CSS devices running version 8.10.6.03S or later, or 8.20.4.03S or later can be configured to first remove HTTP headers in requests before appending the CSS's own headers. The default configuration in these versions is not to remove these headers, but if configured with ssl pre-remove-http-hdr they are not affected.

 
IntelliShield Analysis

This vulnerability could affect any CSS or SSLM installation, but could have a greater impact on installations configured to perform client certificate validation through the following configuration statement on the CSS: ssl-server < CONTEXT >http-header client-cert and the following ssl-proxy policy http-header configuration statement on the SSLM: client-cert.

Ultimately, the impact of this vulnerability will depend on the applications behind an affected CSS device and how those devices handle the presence of multiple SSL headers throughout HTTP requests.  If the applications process the last headers that appear in the request, they will receive those added by the CSS, but any other handling of SSL headers could result in the processing of the wrong headers.

 
Vendor Announcements

The CSS behavior is documented in Cisco bug ID CSCsz04690

Cisco thanks Virtual Security Research, LLC, George D. Gal researcher for reporting this issue.

 
Impact

An authenticated, remote attacker could exploit this vulnerability to insert spoofed SSL certificates into HTTP requests.  The spoofed certificates could allow the attacker to perform man-in-the-middle attacks and gain access to sensitive information.

 
Technical Information

When using the CSS to terminate SSL communications, SSL client certificates are first authenticated by the CSS.  From there, the CSS will normally pass the client's identity to the back-end web server in the form of several HTTP headers.  Because the CSS inserts SSL certificate information headers at the end of the request header, there is a possibility that an attacker could insert spoofed headers earlier in the header. Some servers may then process the first instance of the header and use the spoofed header instead of the header inserted by the CSS.

 
Safeguards

On the CSS, the ssl-server < CONTEXT >http-header prefix < RANDOM_PREFIX > command will further secure the headers from the spoofing exposure by allowing a server administrator to define a random header prefix that will be prepended to new client certificates.

Usage and configuration of this command for the CSS is documented in the CSS Command Reference.

On the SSLM, the following ssl-proxy policy http-header configuration statement will insert a configured prefix that will be prepended to the SSLM-inserted headers: prefix
< prefix >
.  Also on the SSLM, the header names may be changed via the following ssl-proxy policy http-header configuration statement: alias < alias string > < header name >.

Use and configuration of this command for the SSLM are documented in the SSL Services Module Command Reference.

In addition, with CSS releases 8.20.4.03S and 8.10.6.03S, the following new command has been implemented: ssl pre-remove-http-hdr. This command will remove existing headers prior to inserting a new header. For example, if the software is configured for client certificate information, this command would cause existing client certificate headers to be removed and then the new headers would be inserted. Note that this functionality does not work with prefixes. The default behavior will continue to ignore headers before insertion. The no ssl pre-remove-http-hdr command reverts to default behavior. This command may impact CSS performance based on the number of headers present.

SSL header insertion was first implemented in the ACE module with version A2(3.0). SSL header insertion functionality does not exist in the ACE appliance.

The ACE module allows header deletion and rewrite as documented in the ACE Configuration Guide for software version A2(3.0).

 
Patches/Software

Cisco customers can obtain upgrades by contacting the Cisco Technical Assistance Center at 1-800-553-2447 or 1-408-526-7209 or via e-mail at tac@cisco.com.

 
Alert History
 

Version 2, July 14, 2010, 12:51 PM: Cisco has confirmed that the SSL Services Module is also affected by this vulnerability.  CVSS scoring details have been updated to correctly reflect the vulnerability details.

Version 1, July 2, 2010, 10:15 AM: Cisco Content Services Switch and Application Control Engine contain a vulnerability that could allow an unauthenticated, remote attacker to insert spoofed SSL headers into HTTP requests. Updates are available.



Product Sets
 
The security vulnerability applies to the following combinations of products.

Primary Products:
CiscoCisco Content Services Switch (CSS) 11501 7.50.1.03, 7.50.2.05, 7.50.3.03, 8.10.1.06, 8.10.2.05, 8.10.3.01, 8.10.4.01, 8.10.5.03, 8.10.6.02, 8.20.1.01, 8.20.2.01, 8.20.3.03, 8.20.4.02 | 11503 7.50.1.03, 7.50.2.05, 7.50.3.03, 8.10.1.06, 8.10.2.05, 8.10.3.01, 8.10.4.01, 8.10.5.03, 8.10.6.02, 8.20.1.01, 8.20.2.01, 8.20.3.03, 8.20.4.02 | 11506 7.50.1.03, 7.50.2.05, 7.50.3.03, 8.10.1.06, 8.10.2.05, 8.10.3.01, 8.10.4.01, 8.10.5.03, 8.10.6.02, 8.20.1.01, 8.20.2.01, 8.20.3.03, 8.20.4.02
CiscoCisco SSL Services Module 1.1 (1) | 1.2 (1), (2) | 2.1 (1), (2), (3), (4), (5), (6), (7), (8), (9), (10), (11), (12) | 3.1 (1), (2), (3), (4)

Associated Products:
N/A




Alerts and bulletins on the Cisco Security Intelligence Operations Portal are highlighted by analysts in the Cisco Threat Operations Center and represent a subset of the comprehensive content that is available through Cisco Security IntelliShield Alert Manager Service. This customizable threat and vulnerability alert service provides security staff with access to timely, accurate, and credible information about threats and vulnerabilities that may affect their environment.


LEGAL DISCLAIMER
The urgency and severity ratings of this alert are not tailored to individual users; users may value alerts differently based upon their network configurations and circumstances. THE ALERT, AND INFORMATION CONTAINED THEREIN, ARE PROVIDED ON AN "AS IS" BASIS AND DO NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE ALERT, AND INFORMATION CONTAINED THEREIN, OR MATERIALS LINKED FROM THE ALERT, IS AT YOUR OWN RISK. INFORMATION IN THIS ALERT AND ANY RELATED COMMUNICATIONS IS BASED ON OUR KNOWLEDGE AT THE TIME OF PUBLICATION AND IS SUBJECT TO CHANGE WITHOUT NOTICE. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE ALERTS AT ANY TIME.
Powered by  IntelliShield